COMP 3

Ace your homework & exams now with Quizwiz!

What are three functions of session cookies

- analyze and measure traffic on a web page - determine the start and end of a session - determine the web browser being used

stayin safe on the wil' web

- consider using a VPN - use your browser's private browsing. mode - make sure the sites you visit use HTTPS if entering personal info

Which three of the following may be indicators that your system has been hacked

- fake emails or social media messages in your account - unwanted browser toolabrs - redirected internet searches

What is true about firewalls

- having more than one firewall app on your computer may cause conflicts and other problems - the Mac OS includes firewall protection

antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are

- heuristic-based detection - signature-based detection

Which format is best for all spreadsheet programs to access

CSV

A hacker launches an attach on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a ____ attack

DDoS, or DoS

DDoS

Distributed Denial of Service

spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services

UBE

on chrome settings menu to adjust cookie and site data permissions you go to which setting

advanced

Facebook displaying adds based on someones personal profile and browsing history is an online nuisance called

adware

Persistent cookies

collect information about the Internet Protocol (IP) Address - collect password and username information - collect info about user preferences

small text files created by websites you visit that your web browser stores on your hard disk are called what?

cookies

An attack using a computer is a _____

cyberattack

a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist

a spear-phising attack is a phising attack that targets a specific individual. This is commonly launched with a ___ ___

e-mail virus

often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a _______

email

which component of a network designed to prevent unauthorized Internet intrusions

firewall

Juan attempts to gain unauthorized access to networks. Juan would be considered a ____

hacker

Creating a fake webpage to track victims into divulging personal info is a type of phishing known as

pharming

the type of phising that seeks to obtain personal info through malicious software that is inserted on victims computers and directs them to a fake webpage is called

pharming

What type of cookie is stored in temporary memory and is lost when the web browser is closed

session

stored in temporary memory, ____ cookies are used to analyze and measure traffic on a web page.

session

Third-party cookie

small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invaision of privacy

first-party cookie

small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Often accompanying downloaded apps a program that appears to be legitimate but executes an unwanted activity when activated, is called a

trojan

a program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus

trojan

Privacy risks associated with cookies

websites using cookies can collect your information and sell it to third parties - corporate and gov entities can track your web behavior - websites can track your surfing behavior and create a profile

Cyberattacks include which three of the following

- identity theft using a computer or network - pharming - distributed denial-of-service (DDOS) attacks

True statements about fee-based (subscription-based) and free antivirus software programs

- most fee-based software comes with technical support - one of the positives of free antivirus software (other than the cost) is their historicaly strong malware detection performance. CHECK

When a computer is used to commit a crime it is considered a _____

cybercrime

Which three of the following are considered cybercrimes?

data theft, cyberbullying, intentional data corruption

firewall software used to block a user's access to specific Internet content is called a _____ filter

internet

Which three of the following are well-known e-mail attacks

phising, ransomware, keystroke-logging trojan

Web cookie

small text file of information created by websites you visit that your web broser stores on your hard disk

free-based antivirus software often provides more features than free anti-virus

software, YEA

unsolicited email from unknown sender is

spam

makes it easy to arrange, display, and calculate numerical data

spreadsheet programs

color _____ attempts to describe how colors convey feeling. It also describes the way most people perceive messages through color

theory

software that infects computers and is creating using computer code is called a computer ___

virus

One of the risks with cookies is ___

websites using cookies can collect your information and sell it to third parties

firewall programs help protect against

worms and hackers

Cookie Settings in Google Chrome

- blocking/allowing cookies by default - making exceptions for cookies from specific websites or domains - deleting cookies

Persistent cookies store information about which two of the following

- user preferences - password and username information

Which three of the following you should consider in the settings area of each browser

- blocking or customizing your cookie settings - decide from which sites you want to allow cookies - deleting cookies

An internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on what?

Router, Server, Computer

computer software that is designed to prevent spam messages from entering into a user's email inbox is called a ____ filter

spam


Related study sets

Fluids and Electrolytes, Acids and Bases

View Set

Immunology - Major Histocompatibility Complex (MHC Class 1 and 2)

View Set

UARK MGMT 2103H Exam 1 Practice Questions

View Set

Practical Math | Working with Data-Part 1 | 3rd attempt questions

View Set

End of Semester Test: English 12A (PLATO)

View Set

SS Chapter 9 - Muslim Innovations & adaptations

View Set

Retirement Planning - Other Tax-Advantaged Retirement Plans (Module 5)

View Set

Georgira Rules and Codes Pertinent to Life and Accident & Sickness Ins

View Set

Endocrine PhysioEx Metabolism Lab Assignment

View Set